posted by user: Xavier || 11868 views || tracked by 14 users: [display]

MDPI Information 2019 : MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security

FacebookTwitterLinkedInGoogle

Link: https://www.mdpi.com/journal/information/special_issues/ML_Cybersecurity
 
When N/A
Where N/A
Submission Deadline Feb 28, 2019
Categories    machine learning   security   intrusion detection systems   artificial intelligence
 

Call For Papers

Dear Colleagues,

Over the past decade, the rise of new technologies, such as the Internet of Things and associated interfaces, have dramatically increased the attack surface of consumers and critical infrastructure networks. New threats are being discovered on a daily basis making it harder for current solutions to cope with the large amount of data to analyse. Numerous machine learning algorithms have found their ways in the field of cyber-security in order to identify new and unknown malware, improve intrusion detection systems, enhance spam detection, or prevent software exploit to execute.

While these applications of machine learning algorithms have been proven beneficial for the cyber-security industry, they have also highlighted a number of shortcomings, such as the lack of datasets, the inability to learn from small datasets, the cost of the architecture, to name a few. On the other hand, new and emerging algorithms, such as Deep Learning, One-shot Learning, Continuous Learning and Generative Adversarial Networks, have been successfully applied to solve natural language processing, translation tasks, image classification and even deep face recognition. It is therefore crucial to apply these new methods to cyber-security and measure the success of these less-traditional algorithms when applied to cyber-security.

This Special Issue on machine learning for cyber-security is aimed at industrial and academic researcher applying non-traditional methods to solve cyber-security problems. The key areas of this Special Issue include, but are not limited to:

+ Generative Adversarial Models;
+ One-shot Learning;
+ Continuous Learning;
+ Challenges of Machine Learning for Cyber Security;
+ Strength and Shortcomings of Machine Learning for Cyber-Security;
+ Graph Representation Learning;
+ Scalable Machine Learning for Cyber Security;
+ Neural Graph Learning; Machine Learning Threat Intelligence;
+ Ethics of Machine Learning for Cyber Security Applications

Dr. Xavier Bellekens
Guest Editor

High visibility: indexed by Ei Compendex, Scopus (Elsevier), Emerging Sources Citation Index (ESCI - Web of Science)

Related Resources

ACM ICCSIT 2026   ACM--2026 The 19th International Conference on Computer Science and Information Technology (ICCSIT 2026)
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
ISCTIS 2026   IEEE 2026 6th International Symposium on Computer Technology and Information Science
AMLDS 2026   IEEE--2026 2nd International Conference on Advanced Machine Learning and Data Science
EIBDCT 2026   2026 5th International Conference on Electronic Information Engineering, Big Data and Computer Technology
CFP-CIPCV-EI/SCOPUS 2026   The 2026 4th International Conference on Intelligent Perception and Computer Vision
IEEE-ISEAE 2026   IEEE 2026 8th International Conference on Information Science, Electrical and Automation Engineering
CVIPPR 2026   2026 4th Asia Conference on Computer Vision, Image Processing and Pattern Recognition (CVIPPR 2026)
IEEE-IITS 2026   2026 International Conference on Information Communication, IoT Technology, and Smart Cities
AINIT 2026   2026 7th International Seminar on Artificial Intelligence, Networking and Information Technology